1/153
Flashcards for computer architecture terminology and concepts, aiding in understanding the key elements and processes involved.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
CPU
Responsible for executing instructions and processing data.
Microprocessor
An integrated circuit containing the functions of a computer's central processing unit.
Von Neumann Architecture
A computer architecture that describes a system where the CPU, memory, and I/O are separate and instructions and data are stored in memory.
ALU
Performs arithmetic and logical operations.
CU
Coordinates the operations of the computer's processor, managing data flow and instruction execution.
Registers
Small, fast storage locations within the CPU for holding temporary data and instructions.
Program Counter (PC)
Register that holds the address of the next instruction to be executed.
Memory Address Register (MAR)
Holds the memory address from which data is to be fetched or to which it is to be written.
Memory Data Register (MDR)
Holds the data that is being transferred to or from the memory.
Current Instruction Register (CIR)
Holds the instruction currently being executed.
Accumulator (ACC)
Stores intermediate results of arithmetic and logic operations.
Buses
Sets of parallel wires used to connect different components of a computer.
Address Bus
A unidirectional bus that carries information about the address of data.
Data Bus
A bidirectional bus that carries actual data between the CPU and memory.
Control Bus
A bidirectional bus that carries control signals between components.
Fetch-Decode-Execute Cycle
The cycle in which the CPU fetches an instruction from memory, decodes it, and executes it.
Instruction Set
The complete set of machine language instructions that a processor can execute.
Embedded Systems
Computer systems designed to perform dedicated functions within larger systems.
System Clock
Controls the timing of all operations in the CPU.
Cache Memory
A smaller, faster type of volatile memory that provides high-speed data access to the CPU.
Overclocking
Increasing a CPU's clock speed beyond its rated limits to enhance performance.
Underclocking
Reducing a CPU's clock speed to decrease power consumption and heat.
Cores
Independent processing units within a CPU that can execute tasks simultaneously.
Dual-core Processor
A CPU with two independent cores for processing multiple tasks.
Quad-core Processor
A CPU with four independent cores for enhanced multitasking.
Motherboard
The main circuit board in a computer that holds the CPU, memory, and other essential components.
ROM
Non-volatile storage that retains data even when powered off that stores start-up routines and boot up files.
RAM
Volatile storage used for temporary data while a computer is running.
Networking Devices
Hardware that connects computers and manages data traffic between them.
Router
A device that forwards data packets between networks, directing traffic.
Switch
A device that connects devices within a local area network (LAN) and filters data traffic.
IP Address
A unique address that identifies the location of a device on a network.
Dynamic IP Address
An IP address that is assigned temporarily and can change with each connection.
Static IP Address
A permanent IP address that does not change.
NIC
Allows a device to connect to a network that has MAC address.
VPN
Creates a secure connection over a public network.
DNS
Translates domain names to IP addresses.
Backup
Making copies of data to protect against data loss.
Boot Process
The sequence of events that occurs when a computer is powered on and loads the operating system.
Firmware
Permanent software programmed into a read-only memory.
Malware
Malicious software designed to harm or exploit any programmable device or network.
Validation
An automatic computer check to ensure that data entered into a system is sensible, reasonable, and meets the program's requirements.
Operating System (OS)
Software that manages hardware and software resources of a computer.
Database
Organized collection of data that can be easily accessed, managed, and updated.
Software Application
A program designed to perform specific tasks for the user.
Peripheral Devices
External devices connected to a computer to provide input or output.
User Interface (UI)
The means by which a user interacts with a computer or software.
Voice Recognition
The capability of a machine to identify and respond to human voice inputs.
Artificial Intelligence (AI)
Simulation of human intelligence processes by machines.
Cloud Computing
Delivery of computing services over the internet, including storage, processing power, and software.
Data Encryption
The transformation of data into a secure format that is unreadable without a key.
Web Browser
Software application for accessing information on the World Wide Web.
HTTP
Hypertext Transfer Protocol, used for transmitting hypermedia documents on the web.
HTTPS
Secure version of HTTP, encrypted for secure communication over a computer network.
Bandwidth
The maximum rate of data transfer across a network.
Latency
The delay before a transfer of data begins following an instruction.
Web Server
A server that hosts websites and delivers web pages to clients.
File Transfer Protocol (FTP)
A standard network protocol for transferring files from one host to another.
PRIMARY STORAGE
Part of the computer system the CPU can directly access and for storing data and programs in use.
Data Loss
The loss of data due to corruption, deletion, hardware failure, or natural disasters.
Data Recovery
The process of restoring lost, inaccessible, or corrupted data.
Computer Virus
A type of malicious software that replicates itself and spreads to other computers using an active host.
Phishing
Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity usually mailed with an attachment .
Firewall
A network security system that monitors and controls incoming and outgoing network traffic.
Access Control
A security technique that regulates who or what can view or use resources in a computing environment.
Cybersecurity
The practice of protecting systems, networks, and programs from digital attacks.
Data Integrity
The maintenance of the accuracy and consistency of data over its lifecycle.
Verification
The process of ensuring data is entered into a system accurately and without errors
Latency
The time delay experienced in communication over a network.
Double Entry Check
A data verification method where information is entered twice and compared by the computer.
Encryption Algorithms
Mathematical formulas used to encrypt data.
Virtualization
Creating a virtual version of a resource, such as a server or storage device.
Length Check
Data validation method that verifies the number of characters in a user's input to ensure it meets a specific criterion, such as a minimum or maximum length
Range Check
Verifies that a numeric input is within a specified minimum and maximum value.
Records in DB
No of data rows in a table that contains the complete information about the entity.
CCD
s
Sensor that converts light into electrical charges
Software Development Life Cycle (SDLC)
A process for planning, creating, testing, and deploying software.
Prototyping
An early sample, model, or release of a product to test concepts.
Format Check
Ensures input data adheres to a specific pattern or structure
Presence check
Verifies a user has entered data into a required field and that the field is not left blank.
Industry Standards
Established norms or requirements about technical systems.
Type Check
Ensures the data entered into a field matches the required data type for that field.
RSI
Repititove Strain injury resulting from repetitive motion or overuse of muscles. stain causing pain or discomfort.
Check Digit
A single digit added to the end of a sequence of numbers (such as a barcode, ISBN, or account number) that is calculated using a specific algorithm applied to the other digits in the sequence.
Artificial Neural Networks
Computing systems inspired by the biological neural networks.
Integer
Used to store whole numbers (positive, negative, or zero) that do not have a fractional or decimal part.
Digital Signature
A mathematical scheme for verifying the authenticity and integrity of a message.
Data Breach
A security incident where unauthorized access to sensitive data happens.
Real
A numerical data type used to store numbers that have a fractional or decimal component.
String
A data type used in programming to represent a sequence of characters, such as letters, numbers, symbols, and spaces
Character
Used to store a single character.
Boolean
Can store one of only two possible values: TRUE or FALSE.
SELECT - SQL
DML command used to retrieve data from one or more tables within a relational database.The SELECT statement allows users to specify which columns of data to return, apply conditions, and sort results.
SQL - WHERE clause
Used to filter records, allowing a query to extract, update, or delete only those rows that fulfill a specified condition or set of conditions. I
SQL - ORDER BY clause
Used to sort the result set of a SELECT query based on one or more specified columns.
SQL - SUM
An aggregate function used to calculate the total sum of all non-NULL numeric values in a specified column or expression within a database table.
SQL - COUNT
An aggregate function that returns the number of rows that match a specified criterion.
AND Gate
A basic digital logic gate that outputs true or high only if all of its inputs are true or high.
OR Gate
A basic digital logic gate that outputs true or high if at least one of its inputs is true or high.
NOR gate
A digital logic gate that outputs true or high only if all of its inputs are false or low.